scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Biometric identification

01 Feb 2000-Communications of The ACM-Vol. 43, Iss: 2, pp 90-98
TL;DR: As people become more connected electronically, the ability to achieve a highly accurate automatic personal identification system is substantially more critical and organizations are looking to automated identity authentication systems to improve customer satisfaction and operating efficiency.
Abstract: W A LT ER S IP SE R For this reason, more and more organizations are looking to automated identity authentication systems to improve customer satisfaction and operating efficiency as well as to save critical resources (see Figure 1). Furthermore, as people become more connected electronically, the ability to achieve a highly accurate automatic personal identification system is substantially more critical [5]. Personal identification is the process of associating a particular individual with an identity. Identification can be in the form of verification (also known as authentication), which entails authenticating a claimed identity (“Am I who I claim I am?”), or recognition (also known as identification), which entails determining the identity of a given person from a database of persons known to the system (“Who am I?”). Knowledge-based and token-based automatic personal identification approaches have been the two traditional techniques widely used [8]. Token-based approaches use something you have to make a personal identification, such as a passport, driver’s license, ID card, credit card, or keys. Knowledge-based approaches use something you know to make a personal identification, such as a password or a personal identification number (PIN). Since these traditional approaches are not based on any inherent attributes of an individual to make a personal identification, they suffer from the
Citations
More filters
Journal ArticleDOI
TL;DR: The relationship of this new field to its predecessors is examined: distributed systems and mobile computing, and four new research thrusts are identified: effective use of smart spaces, invisibility, localized scalability, and masking uneven conditioning.
Abstract: This article discusses the challenges in computer systems research posed by the emerging field of pervasive computing. It first examines the relationship of this new field to its predecessors: distributed systems and mobile computing. It then identifies four new research thrusts: effective use of smart spaces, invisibility, localized scalability, and masking uneven conditioning. Next, it sketches a couple of hypothetical pervasive computing scenarios, and uses them to identify key capabilities missing from today's systems. The article closes with a discussion of the research necessary to develop these capabilities.

2,584 citations


Cites background from "Biometric identification"

  • ...• What are the authentication techniques best suited to pervasive computing? Are password-based challengeresponse protocols such as Kerberos [36] adequate or are more exotic techniques such as biometric authentication [15] necessary? What role, if any, can smart cards [14] play?...

    [...]

Journal ArticleDOI
TL;DR: The inherent strengths of biometrics-based authentication are outlined, the weak links in systems employing biometric authentication are identified, and new solutions for eliminating these weak links are presented.
Abstract: Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e-commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.

1,709 citations

Journal ArticleDOI
01 Sep 2008
TL;DR: This paper presents the state of the art in automatic signature verification and addresses the most valuable results obtained so far and highlights the most profitable directions of research to date.
Abstract: In recent years, along with the extraordinary diffusion of the Internet and a growing need for personal verification in many daily applications, automatic signature verification is being considered with renewed interest. This paper presents the state of the art in automatic signature verification. It addresses the most valuable results obtained so far and highlights the most profitable directions of research to date. It includes a comprehensive bibliography of more than 300 selected references as an aid for researchers working in the field.

688 citations


Cites background from "Biometric identification"

  • ...Thus, biometric attributes do not suffer from the disadvantages of either the token-based approaches, whose attributes can be lost or stolen, and knowledge-based approaches, whose attributes can be forgotten [137], [325]....

    [...]

  • ...Although a wide set of biometrics has been considered so far, it is worth noting that no trait is able to completely satisfy all the desirable characteristics required for a biometric system [137]....

    [...]

  • ...Thus, the assessment of a biometric trait is strongly dependent on the specific application since it involves not only technical issues but also social and cultural aspects [137], [322], [325]....

    [...]

Book
06 Nov 2003
TL;DR: This complete, technical guide details the principles, methods, technologies, and core ideas used in biometric authentication systems and defines and explains how to measure the performance of both verification and identification systems.
Abstract: This complete, technical guide details the principles, methods, technologies, and core ideas used in biometric authentication systems. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers a number of topics critical for successful system integration. These include recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance. The "Guide to Biometrics:" * Debunks myths and candidly confronts problems associated with biometrics research * Details relevant issues in choosing between biometrics, as well as defining and measuring performance * Defines and explains how to measure the performance of both verification and identification systems * Addresses challenges in managing tradeoffs between security and convenience Security and financial administrators, computer science professionals, and biometric systems developers will all benefit from an enhanced understanding of this important technology.

658 citations

Proceedings ArticleDOI
05 Dec 2005
TL;DR: This survey tries to answer two important questions: "Are graphical passwords as secure as text-based passwords?" and "What are the major design and implementation issues for graphical passwords?"
Abstract: The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend to pick passwords that can be easily guessed. On the other hand, if a password is hard to guess, then it is often hard to remember. To address this problem, some researchers have developed authentication methods that use pictures as passwords. In this paper, we conduct a comprehensive survey of the existing graphical password techniques. We classify these techniques into two categories: recognition-based and recall-based approaches. We discuss the strengths and limitations of each method and point out the future research directions in this area. We also try to answer two important questions: "Are graphical passwords as secure as text-based passwords?"; "What are the major design and implementation issues for graphical passwords?" This survey will be useful for information security researchers and practitioners who are interested in finding an alternative to text-based authentication methods

585 citations


Cites methods from "Biometric identification"

  • ...To address the problems with traditional usernamepassword authentication, alternative authentication methods, such as biometrics [3, 7], have been used....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: A method for rapid visual recognition of personal identity is described, based on the failure of a statistical test of independence, which implies a theoretical "cross-over" error rate of one in 131000 when a decision criterion is adopted that would equalize the false accept and false reject error rates.
Abstract: A method for rapid visual recognition of personal identity is described, based on the failure of a statistical test of independence. The most unique phenotypic feature visible in a person's face is the detailed texture of each eye's iris. The visible texture of a person's iris in a real-time video image is encoded into a compact sequence of multi-scale quadrature 2-D Gabor wavelet coefficients, whose most-significant bits comprise a 256-byte "iris code". Statistical decision theory generates identification decisions from Exclusive-OR comparisons of complete iris codes at the rate of 4000 per second, including calculation of decision confidence levels. The distributions observed empirically in such comparisons imply a theoretical "cross-over" error rate of one in 131000 when a decision criterion is adopted that would equalize the false accept and false reject error rates. In the typical recognition case, given the mean observed degree of iris code agreement, the decision confidence levels correspond formally to a conditional false accept probability of one in about 10/sup 31/. >

3,399 citations


"Biometric identification" refers background in this paper

  • ...Furthermore, the iris is more readily imaged than retina; it is extremely difficult to surgically tamper iris texture information and it is easy to detect artificial irises (for example, designer contact lenses) [3]....

    [...]

Journal ArticleDOI
01 May 1995
TL;DR: A critical survey of existing literature on human and machine recognition of faces is presented, followed by a brief overview of the literature on face recognition in the psychophysics community and a detailed overview of move than 20 years of research done in the engineering community.
Abstract: The goal of this paper is to present a critical survey of existing literature on human and machine recognition of faces. Machine recognition of faces has several applications, ranging from static matching of controlled photographs as in mug shots matching and credit card verification to surveillance video images. Such applications have different constraints in terms of complexity of processing requirements and thus present a wide range of different technical challenges. Over the last 20 years researchers in psychophysics, neural sciences and engineering, image processing analysis and computer vision have investigated a number of issues related to face recognition by humans and machines. Ongoing research activities have been given a renewed emphasis over the last five years. Existing techniques and systems have been tested on different sets of images of varying complexities. But very little synergism exists between studies in psychophysics and the engineering literature. Most importantly, there exists no evaluation or benchmarking studies using large databases with the image quality that arises in commercial and law enforcement applications In this paper, we first present different applications of face recognition in commercial and law enforcement sectors. This is followed by a brief overview of the literature on face recognition in the psychophysics community. We then present a detailed overview of move than 20 years of research done in the engineering community. Techniques for segmentation/location of the face, feature extraction and recognition are reviewed. Global transform and feature based methods using statistical, structural and neural classifiers are summarized. >

2,727 citations

Journal ArticleDOI
01 Sep 1997
TL;DR: The design and implementation of a prototype automatic identity-authentication system that uses fingerprints to authenticate the identity of an individual is described and an improved minutiae-extraction algorithm is developed that is faster and more accurate than the earlier algorithm.
Abstract: Fingerprint verification is an important biometric technique for personal identification. We describe the design and implementation of a prototype automatic identity-authentication system that uses fingerprints to authenticate the identity of an individual. We have developed an improved minutiae-extraction algorithm that is faster and more accurate than our earlier algorithm (1995). An alignment-based minutiae-matching algorithm has been proposed. This algorithm is capable of finding the correspondences between input minutiae and the stored template without resorting to exhaustive search and has the ability to compensate adaptively for the nonlinear deformations and inexact transformations between an input and a template. To establish an objective assessment of our system, both the Michigan State University and the National Institute of Standards and Technology NIST 9 fingerprint data bases have been used to estimate the performance numbers. The experimental results reveal that our system can achieve a good performance on these data bases. We also have demonstrated that our system satisfies the response-time requirement. A complete authentication procedure, on average, takes about 1.4 seconds on a Sun ULTRA I workstation (it is expected to run as fast or faster on a 200 HMz Pentium).

976 citations


"Biometric identification" refers background in this paper

  • ...Humans have used fingerprints for personal identification for centuries and the validity of fingerprint identification has been well-established [6]....

    [...]

Journal ArticleDOI
TL;DR: The range of biometric systems in development or on the market including: handwriting; fingerprints; iris patterns; human faces; and speech are described.
Abstract: Biometrics is emerging as the most foolproof method of automated personal identification in demand in an ever more automated world. Biometric systems are automated methods of verifying or recognizing the identity of a living person on the basis of some physiological characteristic, like a fingerprint or iris pattern, or some aspect of behavior, like handwriting or keystroke patterns. This paper describes the range of biometric systems in development or on the market including: handwriting; fingerprints; iris patterns; human faces; and speech. >

331 citations

Journal ArticleDOI
TL;DR: Recent advances in speaker recognition technology include VQ- and ergodic-HMM-based text-independent recognition methods, a text-prompted recognition method, parameter/distance normalization and model adaptation techniques, and methods of updating models and a priori thresholds in speaker verification.

326 citations


"Biometric identification" refers background in this paper

  • ...The invariance in the individual characteristics of human speech is primarily due to relatively invariant shape/size of the appendages (vocal tracts, mouth, nasal cavities, lips) synthesizing the sound [4]....

    [...]